Abu-Salma et al., 2017 - Google Patents
Obstacles to the adoption of secure communication toolsAbu-Salma et al., 2017
View PDF- Document ID
- 7657972868503085322
- Author
- Abu-Salma R
- Sasse M
- Bonneau J
- Danilova A
- Naiakshina A
- Smith M
- Publication year
- Publication venue
- 2017 IEEE Symposium on Security and Privacy (SP)
External Links
Snippet
The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal communication tools (eg, WhatsApp, iMessage) have adopted end-to-end encryption, and many new tools …
- 238000004891 communication 0 title abstract description 118
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72522—With means for supporting locally a plurality of applications to increase the functionality
- H04M1/72547—With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages
- H04M1/72552—With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages for text messaging, e.g. sms, e-mail
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72563—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5895—Message switching systems, e.g. electronic mail systems in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/38—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
- H04M1/677—Preventing the dialling or sending of predetermined telephone numbers or selected types of telephone numbers, e.g. long distance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/12—Mobile application service signalling using messaging, e.g. SMS [Short Message Service]; Mobile application service signalling using mailboxes; Mobile application service signalling using announcements, e.g. informing users on the status or progress of a communication request
- H04W4/14—Mobile application service signalling using short messaging services, e.g. SMS or USSD [Unstructured Supplementary Service Data]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/24—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with notification on incoming messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/57—Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/28—Details regarding addressing issues
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/26—Devices for signalling identity of wanted subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, i.e. memories whose operation does not require relative movement between storage means and a transducer, e.g. chip
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42382—Text-based messaging services in telephone networks such as PSTN/ISDN, e.g. User-to-User Signalling or Short Message Service for fixed networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Abu-Salma et al. | Obstacles to the adoption of secure communication tools | |
US20240089285A1 (en) | Automated responsive message to determine a security risk of a message sender | |
Redmiles | " Should I Worry?" A Cross-Cultural Examination of Account Security Incident Response | |
McGregor et al. | When the weakest link is strong: Secure collaboration in the case of the Panama Papers | |
Abu-Salma et al. | The security blanket of the chat world: An analytic evaluation and a user study of telegram | |
Renaud et al. | Why doesn’t Jane protect her privacy? | |
Abu-Salma et al. | Exploring user mental models of {End-to-End} encrypted communication tools | |
Nthala et al. | Informal support networks: an investigation into home data security practices | |
Ruoti et al. | Weighing context and trade-offs: How suburban adults selected their online security posture | |
Gerber et al. | Finally johnny can encrypt: But does this make him feel more secure? | |
Nyasvisvo et al. | Phishing attacks: a security challenge for university students studying remotely | |
Abu-Salma | Designing user-centered privacy-enhancing technologies | |
Al Qahtani et al. | The impact of risk appeal approaches on users’ sharing confidential information | |
Chitare et al. | “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations | |
Boothroyd | Older Adults' Perceptions of Online Risk | |
Raburn | Exploring why consumers do not use current cybersecurity mitigation strategies for IoT smart devices in the home | |
Henriksson | What are the motivations and barriers for incorporating multi-factor authentication among IT students? | |
Fischer et al. | " If You Want to Encrypt It Really, Really Hardcore...": User Perceptions of Key Transparency in WhatsApp | |
Nthala | Home data security decisions | |
Geeta Dharmavaram | Data privacy in education sector–issues and measures | |
Maseko | Remedies to reduce user susceptibility to phishing attacks | |
Yadulla | A Qualitative Approach to Data Breaches in Mobile Devices | |
Zainabi et al. | Security risks of chatbots in customer service: a comprehensive literature review | |
Michalíková | User management of multiple email accounts via forwarding and password recovery options | |
Yadav et al. | InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users |